Enterprise Threat Protector

Proactive protection against zero-day malware

Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration, and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can safely connect to the Internet, regardless of where they are connecting from, without the complexity associated with legacy approaches.

Enterprise Threat Protector is a cost-effective security solution that can be installed and setup in minutes.

Learn More Buy Now Try Now
Spotlight on Enterprise Threat Protector
???Watch the Video???

Improve Security Posture Everywhere

Your recursive DNS is likely unprotected, and as such, could be exploited. In a matter of minutes, add a layer of security that uses DNS as a control point to uniformly and immediately block malicious domains and communications for all of your users, whether they are on or off network.
Learn More

Secure Direct Internet Access (DIA) Connections

Protect your branch DIA traffic quickly with zero complexity, without replicating your security stack at every location.
Learn More

Protect Guest Wi-Fi

Easily enforce an acceptable use policy (AUP) across your guest Wi-Fi for both brand and user protection.
Learn More

Customer Case Study: Perform Group

Working with Akamai, we were able to quickly isolate, contain, and remove threats to our infrastructure, delivering greater integrity with less effort.
Daniel Schatz, CISO, Perform Group

Read More

Features: Enterprise Threat Protector

Real-time Akamai Threat Intelligence

Up-to-the-minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 trillion recursive DNS requests, and proprietary data science algorithms.

Analysis and Reporting

Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.

Inline Real-time Payload Analysis

Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.

Logging

DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.

Acceptable Use Policy (AUP) Management

Customize and enforce your enterprise AUP and ensure compliance by limiting access to certain content categories.

Security Insights

Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.

Customer-Categorized Threat Customization

Integrate existing threat intelligence feeds, extending value from your existing security investments.

DNSSEC

All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.

  • Guest Wi-Fi
  • Intelligence
  • Advanced Threat
Security
  • Block malware, phishing, and CnC
  • Identify DNS data exfiltration
  • URL inspection
  • Inline payload analysis
  • Enforce security for roaming users
Acceptable Use Policy (AUP)
  • Enforce AUPs
  • Enforce Safe Search
Reporting, Monitoring, and Administration
  • Real-time, enterprise-wide activity and search
  • Integrations via an open API
  • Delegated administration

Learn More

How Does Enterprise Threat Protector Work?

Akamai Enterprise Threat Protector Overview

Enterprise Threat Protector uses multiple layers of protection — DNS, URL, and inline payload analysis — to deliver optimal security and reduced complexity, without impacting performance.

By simply directing your external recursive DNS traffic to Enterprise Threat Protector, all requested domains are checked against Akamai’s real-time domain risk scoring threat intelligence.

Safe domains are resolved as normal, malicious domains are blocked, and risky domains are sent to a smart selective proxy where the HTTP or HTTPS URLs are inspected to determine if they are malicious. The HTTP and HTTPS payloads from risky domains are then scanned in real-time using multiple advanced malware-detection engines.

Enterprise Threat Protector Insights